2021
DOI: 10.1016/j.comnet.2021.108525
|View full text |Cite
|
Sign up to set email alerts
|

Secure IoT edge: Threat situation awareness based on network traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 45 publications
0
7
0
Order By: Relevance
“…We further evaluated the prediction performance of dynamic defense and compared it with TSA-AdaBoost [ 49 ], a situation awareness algorithm based on the AdaBoost machine learning method. DDESS adopts the batch normalization [ 40 ] to reduce the influence of gradient vanishing problem, and max-pooling layer and convolutional kernel [ 41 ] for dimensionality reduction.…”
Section: Methodsmentioning
confidence: 99%
“…We further evaluated the prediction performance of dynamic defense and compared it with TSA-AdaBoost [ 49 ], a situation awareness algorithm based on the AdaBoost machine learning method. DDESS adopts the batch normalization [ 40 ] to reduce the influence of gradient vanishing problem, and max-pooling layer and convolutional kernel [ 41 ] for dimensionality reduction.…”
Section: Methodsmentioning
confidence: 99%
“…Therefore, we can use an FPGA to configure a circuit and then change the configured circuit to support another one. Based upon this logic, we integrate an FPGA into an IoT circuit or interface an FPGA with an IoT circuit [102]. However, the integrated FPGA has some threat-aware components [103], which would become activated when the IoT network endures a DDoS attack and note down the attackers' IP addresses.…”
Section: Ddos Detection and Mitigation: The Iot-fpga Approachmentioning
confidence: 99%
“…However, as the number of devices upsurges, so does the risk of cyber threats, particularly botnets. Botnets are collections of compromised devices that a cybercriminal can remotely operate without the owner's knowledge or permission [4]. Botnets can be used to carry out a range of malicious activities, including Distributed Denial of Service attacks, spamming, phishing, and crypto currency mining.…”
Section: Introductionmentioning
confidence: 99%
“…Different Deep Learning (DL) techniques have been suggested in earlier studies as a means of defending communication networks from cyber-attacks. It might be difficult to offload enormous distributed IoT network traffic data to a remote central cloud server for real-time data processing, nevertheless, as IoT networks continue to grow and become more scalable [4]. The CDL technique also needs more time for training, has a lot of communication overhead, and takes up a lot of RAM for data storage [1].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation